• Title/Summary/Keyword: Trust Cluster

Search Result 70, Processing Time 0.022 seconds

Secure Cluster Head Elections Based on Trust for Wireless Sensor Networks (무선 센서 네트워크를 위한 신뢰 기반의 안전한 클러스터 헤드 선출)

  • Wang, Gicheol;Cho, Gihwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.50-64
    • /
    • 2013
  • In clustered sensor networks, since a CH (Cluster Head) collects data from its members and delivers the collected data to the sink, it is very important to prevent compromised nodes from joining a CH election and manipulating and fabricating the election result. In order to protect CH elections from compromised nodes, unpredictability, non-manipulability, and agreement property should be guaranteed in CH elections. However, existing CH election schemes cannot prevent intelligent compromised nodes from skilfully violating those properties via their cooperation. In this paper, we propose a scheme which protects the CH election process by detecting intelligent compromised nodes and excluding them. For every CH election round, each member gives a direct trust value to other members according to their behavior. Then a real reputation value is given to each member by combining the direct trust value and indirect trust values provided by other members. Then, each node evaluates the real reputation values of members in its cluster and excludes some untrustable nodes from CH candidates. The scheme greatly improves the non-manipulability and agreement property of CH election results compared to other rival schemes. Furthermore, the scheme preserves the high non-manipulability and the high agreement property even in an environment where message losses can happen.

A Study on Improved Intrusion Detection Technique Using Distributed Monitoring in Mobile Ad Hoc Network (Mobile Ad Hoc Network에서 분산 모니터링을 이용한 향상된 침입탐지 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.35-43
    • /
    • 2018
  • MANET composed of only wireless nodes is increasingly utilized in various fields. However, it is exposed to many security vulnerabilities because it doesn't have any infrastructure and transmits data by using multi-hop method. Therefore, MANET should be applied the intrusion detection technique that can detect efficiently malicious nodes and decrease impacts of various attacks. In this paper, we propose a distributed intrusion detection technique that can detect the various attacks while improving the efficiency of attack detection and reducing the false positive rate. The proposed technique uses the cluster structure to manage the information in the center and monitor the traffic of their neighbor nodes directly in all nodes. We use three parameters for attack detection. We also applied an efficient authentication technique using only key exchange without the help of CA in order to provide integrity when exchanging information between cluster heads. This makes it possible to free the forgery of information about trust information of the nodes and attack nodes. The superiority of the proposed technique can be confirmed through comparative experiments with existing intrusion detection techniques.

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

The Core Values that Support Health, Safety, and Well-being at Work

  • Zwetsloot, Gerard I.J.M.;van Scheppingen, Arjella R.;Bos, Evelien H.;Dijkman, Anja;Starren, Annick
    • Safety and Health at Work
    • /
    • v.4 no.4
    • /
    • pp.187-196
    • /
    • 2013
  • Background: Health, safety, and well-being (HSW) at work represent important values in themselves. It seems, however, that other values can contribute to HSW. This is to some extent reflected in the scientific literature in the attention paid to values like trust or justice. However, an overview of what values are important for HSW was not available. Our central research question was: what organizational values are supportive of health, safety, and well-being at work? Methods: The literature was explored via the snowball approach to identify values and value-laden factors that support HSW. Twenty-nine factors were identified as relevant, including synonyms. In the next step, these were clustered around seven core values. Finally, these core values were structured into three main clusters. Results: The first value cluster is characterized by a positive attitude toward people and their "being"; it comprises the core values of interconnectedness, participation, and trust. The second value cluster is relevant for the organizational and individual "doing", for actions planned or undertaken, and comprises justice and responsibility. The third value cluster is relevant for "becoming" and is characterized by the alignment of personal and organizational development; it comprises the values of growth and resilience. Conclusion: The three clusters of core values identified can be regarded as "basic value assumptions" that underlie both organizational culture and prevention culture. The core values identified form a natural and perhaps necessary aspect of a prevention culture, complementary to the focus on rational and informed behavior when dealing with HSW risks.

The Roles of Intermediaries in Clusters: The Thai Experiences in High-tech and Community-based Clusters

  • Intarakumnerd, Patarapong
    • Journal of Technology Innovation
    • /
    • v.13 no.2
    • /
    • pp.23-43
    • /
    • 2005
  • Industrial clusters are geographical concentrations of interconnected companies, specialised suppliers, service providers, firms in related industries, and associated institutions (for example, universities, standard agencies, and trade associations) that combine to create new products and/or services in specific lines of business. At present, the concept of industrial cluster becomes very popular worldwide, policy makers at national, regional and local levels and business people in both forerunner and latecomer countries are keen to implement the cluster concept as an economic development model. Though understanding of clusters and related promoting policies varies from one place to another, the underlying benefits of clusters from collective learning and knowledge spillovers between participating actors strongly attract the attention of these people. In Thailand, a latecomer country in terms of technological catching up, the cluster concept has been used as a means to rectify weakness and fragmentation of its innovation systems. The present Thai government aspires to apply the concept to promote both high-tech manufacturing clusters, services clusters and community-based clusters at the grass-root level. This paper analyses three very different clusters in terms of technological sophistication and business objectives, i.e., hard disk drive, software and chili paste. It portrays their significant actors, the extent of interaction among them and the evolution of the clusters. Though are very dissimilar, common characteristics attributed to qualified success are found. Main driving forces of the three clusters are cluster intermediaries. Forms of these organizations are different from a government research and technology organization (RTO), an industrial association, to a self-organised community-based organization. However, they perform similar functions of stimulating information and knowledge sharing, and building trust among participating firms/individuals in the clusters. Literature in the cluster studies argues that government policies need to be cluster specific. In this case, the best way to design and implement cluster-specific policies is through working closely with intermediaries and strengthening their institutional especially in linking member firms/individuals to other actors in clusters such as universities, government R&D institutes, and financial institutions.

  • PDF

A Study on Secure Routing Technique using Trust Value and Key in MANET (신뢰도와 키를 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.69-77
    • /
    • 2015
  • MANET is composed of only the mobile nodes have a limited transmission range. The dynamic topology by the frequent movement of nodes makes routing difficult and is also cause exposed to security vulnerabilities. In this paper, we propose the security routing technique consisted of mechanism of two steps in order to respond effectively to attack by the modification of the routing information and transmit secure data. The hierarchical structure is used and the authentication node that issues the key of the nodes within each cluster is elected in this proposed method. The authentication node manages key issues and issued information for encrypting the routing information from the source node. The reliability value for each node is managed to routing trust table in order to secure data transmission. In the first step, the route discovery is performed using this after the routing information is encrypted using the key issued by the authentication node. In the second step, the average reliability value of the node in the found path is calculated. And the safety of the data transmission is improved after the average reliability value selects the highest path. The improved performance of the proposed method in this paper was confirmed through comparative experiments with CBSR and SEER. It was confirmed a better performance in the transmission delay, the amount of the control packet, and the packet transmission success ratio.

Evolutionary & Revival of ChunCheon Cultural Cluster (춘천 문화산업 클러스터의 진화와 회생)

  • Seo, Jeong-Soo;Kwon, Jae-Woong
    • Cartoon and Animation Studies
    • /
    • s.25
    • /
    • pp.155-175
    • /
    • 2011
  • The cultural cluster in Chuncheon was initiated in the late 1990s with the combination of diverse components, which were companies, a local government entity, educational institutions, and human resources. In order to hold ability of standing on its own way in a hard time when the local cultural industries could not had developed by themselves, it urgently required the encouragement policy in the name of industry development. GIMC (Gangwon Information & Multimedia Corporation) was established in this situation, and policy strategies for promoting the cultural cluster was decided on the basis of GIMC's strategies. This article analyzes the evolution process of the local cluster and suggests characteristics of its every stage--initiation, development, and decline--on the basis of cluster competition concept because of the problem to deal with the evolution process of cluster from the existing viewpoint. This article finds out that Chuncheon cluster embarked on cultural cluster strategies without concerning basic elements which had to be prepared from the initial stage. This problem worked as the serious obstacle hampering development of Chunchen cluster. This problem was the matter of policies in providing a direction of industry development as well as leading a local cultural cluster and led to a result of weakening the connection among cluster components. As a result, this article shows that the current status of Chuncheon cultural cluster is being entered the decline stage, and, therefore, suggests that the advanced policy to promote cluster for a next round is urgently needed. Stable closing the first round of cultural cluster policies and thorough preparation for the second round is the only practical solution to minimize side effects of cluster decline. It is the prerequisite to restore trust and, at the same time, reinforce relationship between members who consist of Chuncheon cultural cluster.

A Study on Efficient Group Member Authentication and Key Management Scheme for Multicast Security in MANET (MANET에서 멀티캐스트 보안을 위한 효율적인 그룹 멤버 인증 및 키 관리 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.115-123
    • /
    • 2017
  • The mutual cooperation among nodes is very important because mobile nodes participating in MANET communicate with limited resources and wireless environment. This characteristic is important especially in environment that supports group communication. In order to support the secure multicast environment, it is important enough to affect performance to provide accurate authentication method for multicast group members and increase the integrity of transmitted data. Therefore, we propose a technique to provide the multicast secure communication by providing efficient authentication and group key management for multicast member nodes in this paper. The cluster structure is used for authentication of nodes in the proposed technique. In order to efficient authentication of nodes, the reliability is measured using a combination of local trust information and global trust information measured by neighboring nodes. And issuing process of the group key has two steps. The issued security group key increases the integrity of the transmitted data. The superiority of the proposed technique was confirmed by comparative experiments.

Sirtuin/Sir2 Phylogeny, Evolutionary Considerations and Structural Conservation

  • Greiss, Sebastian;Gartner, Anton
    • Molecules and Cells
    • /
    • v.28 no.5
    • /
    • pp.407-415
    • /
    • 2009
  • The sirtuins are a protein family named after the first identified member, S. cerevisiae Sir2p. Sirtuins are protein deacetylases whose activity is dependent on $NAD^+$ as a cosubstrate. They are structurally defined by two central domains that together form a highly conserved catalytic center, which catalyzes the transfer of an acetyl moiety from acetyllysine to $NAD^+$, yielding nicotinamide, the unique metabolite O-acetyl-ADP-ribose and deacetylated lysine. One or more sirtuins are present in virtually all species from bacteria to mammals. Here we describe a phylogenetic analysis of sirtuins. Based on their phylogenetic relationship, sirtuins can be grouped into over a dozen classes and subclasses. Humans, like most vertebrates, have seven sirtuins: SIRT1-SIRT7. These function in diverse cellular pathways, regulating transcriptional repression, aging, metabolism, DNA damage responses and apoptosis. We show that these seven sirtuins arose early during animal evolution. Conserved residues cluster around the catalytic center of known sirtuin family members.

Privacy Enhanced Security Mechanism for Grid Applications

  • Park, Sang-Bae
    • International Journal of Contents
    • /
    • v.6 no.3
    • /
    • pp.15-18
    • /
    • 2010
  • Grid system is based on the Grid Security Infrastructure (GSI). GSI uses user's proxy to guarantee availability among multi-trust domains. Since grid system has been developed focusing on availability, GSI provides authentication and authorization performed by systems, but there are lacks of privacy consideration. For this reason, some researchers decide to use their own cluster system and do not want to use public grid systems. In this paper, we introduce a new privacy enhanced security mechanism for grid systems. With this mechanism, user can participate in resource allocation and authorization to user's contents more actively. This mechanism does not need to change previous middleware and minimize the computational overheads.